//]]>
Agent and Multi-Agent Systems. Technologies and Applications by Jezic, Gordan. Publication: . XVII, 661p. 226 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Danezis, George. Publication: . XII, 185 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Information Security Technology for Applications by Aura, Tuomas. Publication: . X, 289 p. 73 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Persiano, Giuseppe. Publication: . XI, 327p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Economics of Converged, Internet-Based Networks by Cohen, Johanne. Publication: . IX, 75p. 25 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human Interface and the Management of Information. Interacting with Information by Smith, Michael J. Publication: . XXX, 673p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Human-Computer Interaction. Users and Applications by Jacko, Julie A. Publication: . XXIV, 711 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Algorithmic Game Theory by Kontogiannis, Spyros. Publication: . VIII, 359p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Financial Cryptography and Data Security by Sion, Radu. Publication: . X, 257p. 33 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
CyberForensics by Bayuk, Jennifer. Publication: . XIV, 170 p. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Targeted Advertising Technologies in the ICT Space by Schlee, Christian. Publication: . XXVI, 339 p. 80 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
IT Enabled Services by Uesugi, Shiro. Publication: . IX, 247 p. 77 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Mobile Payment by Lerner, Thomas. Publication: . X, 180 p. 94 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
The Internet of Products by Neumann, Robert. Publication: . XXI, 263 p. 78 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Secure ICT Service Provisioning for Cloud, Mobile and Beyond by Faber, Eberhard. Publication: . XIII, 284 p. 94 illus. in color. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Frontiers in Internet Technologies by Su, Jinshu. Publication: . XII, 277 p. 132 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Modern Cryptography Primer by Kościelny, Czesław. Publication: . XIV, 238 p. 97 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets by David, Esther. Publication: . XII, 161 p. 44 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Introduction to Public Key Infrastructures by Buchmann, Johannes A. Publication: . XV, 194 p. 146 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart
Security in Computing and Communications by Thampi, Sabu M. Publication: . XVI, 404 p. 149 illus. Availability: Copies available: AUM Main Library (1),
Actions: Add to Cart

Languages: 
English |
العربية